Author:
Ji Sai,Wang Zhen,Liu Qi,Liu Xiaodong
Reference14 articles.
1. Xu, L., Jiang, C.X., Wang, J., Yuan, J., Ren, Y.: Information security in big data: privacy and data mining. IEEE Access 2, 1149–1196 (2014)
2. Krawczyk, B., Wozniak, M.: Privacy preserving models of k-NN algorithm. In: Burduk, R., Kurzyński, M., Woźniak, M., Żołnierek, A. (eds.) Computer Recognition Systems 4. AISC, vol. 95, pp. 207–217. Springer, Heidelberg (2011)
3. Lu, W., Jiang, Y.P.: Privacy preserving classification algorithm based on random multidimensional scales. IEEE Comput. Soc. 2, 406–409 (2009)
4. Kesavaraj, G., Sukumaran, S.: A study on classification techniques in data mining. In: IEEE Communications and Networking Technologies (ICCCNT), pp. 1–7 (2013)
5. Rahulamathavan, Y., Phan, R.C.W., Veluru, S., Cumanan, K., Rajarajan, M.: Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud. IEEE Trans. Dependable Secure Comput. 11, 467–479 (2014)
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Authors’ Biographies & Index;Applied Affective Computing;2022-01-25
2. Bibliography;Applied Affective Computing;2022-01-25
3. Future of Affective Computing and Applied Affective Computing;Applied Affective Computing;2022-01-25
4. Addressing Ethical Issues of Affective Computing;Applied Affective Computing;2022-01-25
5. Applied Affective Computing in Built Environments;Applied Affective Computing;2022-01-25